Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Decentralized Information Marketplace Preserving Input and Output Privacy., , , , , , and . DEC@SIGMOD, page 1-6. ACM, (2023)Privacy-Preserving User Profiling with Facebook Likes., , , , , and . IEEE BigData, page 5298-5299. IEEE, (2018)An Evaluation of DGA Classifiers., , , , , and . IEEE BigData, page 5058-5067. IEEE, (2018)Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation., , , , and . NeurIPS, page 3752-3764. (2019)Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data., , , and . AISec@CCS, page 3-14. ACM, (2015)Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols., , , and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 354-367. Springer, (2015)Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations., , , and . ISIT, page 1432-1436. IEEE, (2006)Transport mode assessment for inbound logistics: A study based on coffee industry., , , , and . SMC, page 1318-1323. IEEE, (2014)Information-Theoretically Secure String Commitments Based on Packet Reordering Channels., , , and . IEEE Access, (2021)Cost-adaptive Neural Networks for Peak Volume Prediction with EMM Filtering., , , and . IEEE BigData, page 4208-4213. IEEE, (2019)